Sony Server was DDOS with 263.35 Gbps of Traffic, Now Back Online

A group of hackers deployed a distributed denial-of-service (DDoS) attack on Sunday on Sony services, partially disrupting access to its networks for plenty of gamers. DDoS attack was done with the 263.35 Gbps of junk traffic.

John Smedley, President of Sony Online Entertainment (SOE), tweeted yesterday that Sony was under a massive DDoS attack, saying that games were impacted and that the bad traffic was being filtered with the help of Internet Service Providers (ISPs).

Initially many of the online media noted that a hacker collective going under the name of Lizard Squad directed a large DDoS attack against Sony Online Entertainment and PlayStation Network services. But later on another hacker with the twitter handle @FameGod have tweeted about the attack and also mention to make all member of the Lizard Squad collective IP addresses public.

263.35 Gbps Attack sent to a sony server. RIP Bitches. Another Month of Maintenance.
— Fame (@FamedGod) August 24, 2014

On twitter FamedGod tweeted that they pulled the DDoS by abusing NTP (Network Time Protocol) servers, which blasted 263.35Gbps of bad traffic towards one Sony server. This is also another biggest DDOS attack, and earlier the DDOS attack was noted of 400 GBps which hits the cloudfare European server.

On this incident also hackers have carried out amplification attacks through NTP servers have become more frequent in the second quarter of the year. Hacker have leveraged vulnerable NTP servers to perform DDOS.

With this FameGod have also published a video, which explains that Sony have did not implement sufficient security measures to its network following the 2011 incident, which resulted in the theft of personal details from about 77 million user accounts.